Author of the publication

Modular Design of Real-Time Systems Using Hierarchical Communicating Real-time State Machines

, , and . Real-Time Systems, 32 (1-2): 105--123 (February 2006)
DOI: http://dx.doi.org/10.1007/s11241-006-5318-0

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using CalcuList To MapReduce Json Documents., and . SEBD, volume 2400 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)A cloud based framework for Emergency Management: experiences in Calabria Region., , , , , , , , , and . SEBD, volume 2037 of CEUR Workshop Proceedings, page 275. CEUR-WS.org, (2017)A Cloud-based platform for the emulation of complex cybersecurity scenarios., , , , and . Future Gener. Comput. Syst., (2018)Integration and Interoperability between Jini services andWeb Services., , and . IEEE SCC, page 278-285. IEEE Computer Society, (2007)Modelling and simulation of complex manufacturing systems using statechart-based actors., , and . Simul. Model. Pract. Theory, 19 (2): 685-703 (2011)Model checking time-dependent system specifications using Time Stream Petri Nets and Uppaal., , and . Appl. Math. Comput., 218 (16): 8160-8186 (2012)Adaptive Ladder Queue: Achieving O(1) Amortized Access Time in Practice., and . SIGSIM-PADS, page 101-104. ACM, (2018)A Simulation Model for the Analysis of DDoS Amplification Attacks., , , and . UKSim, page 267-272. IEEE, (2015)Exploiting Content Spatial Distribution to Improve Detection of Intrusions., , and . ACM Trans. Internet Techn., 18 (2): 25:1-25:21 (2018)PCkAD: an unsupervised intrusion detection technique exploiting within payload n-gram location distribution., , and . CoRR, (2014)